WO1999033270A1 - Procede pour securiser un systeme protege par une hierarchie cryptographique - Google Patents
Procede pour securiser un systeme protege par une hierarchie cryptographique Download PDFInfo
- Publication number
- WO1999033270A1 WO1999033270A1 PCT/EP1997/007124 EP9707124W WO9933270A1 WO 1999033270 A1 WO1999033270 A1 WO 1999033270A1 EP 9707124 W EP9707124 W EP 9707124W WO 9933270 A1 WO9933270 A1 WO 9933270A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- key
- cryptographic
- assigned
- subsets
- cryptographic keys
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/442—Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
- H04N21/44236—Monitoring of piracy processes or activities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0891—Revocation or update of secret information, e.g. encryption key update or rekeying
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/436—Interfacing a local distribution network, e.g. communicating with another STB or one or more peripheral devices inside the home
- H04N21/4367—Establishing a secure communication between the client and a peripheral device or smart card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N7/00—Television systems
- H04N7/16—Analogue secrecy systems; Analogue subscription systems
- H04N7/167—Systems rendering the television signal unintelligible and subsequently intelligible
- H04N7/1675—Providing digital key or authorisation information for generation or regeneration of the scrambling sequence
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/606—Traitor tracing
Definitions
- Each key hierarchy has at least a higher hierarchy level of cryptographic keys.
- a higher hierarchical level is formed in that the cryptographic keys of the immediately lower hierarchical level are combined in any manner to form several subsets of a predetermined size, each subset being assigned a cryptographic key which is generated from the cryptographic keys forming the respective subset and then in the storage device is filed. Then at least one individual cryptographic key assigned to a suspicious user is determined by forming the intersection of at least two predetermined subsets that belong to the same hierarchical level of different key hierarchies.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Multimedia (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Storage Device Security (AREA)
- Signal Processing Not Specific To The Method Of Recording And Reproducing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Priority Applications (9)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19649292A DE19649292A1 (de) | 1996-11-28 | 1996-11-28 | Verfahren zum Sichern eines durch eine Schlüsselhierarchie geschützten Systems |
US08/990,446 US6222923B1 (en) | 1996-11-28 | 1997-12-15 | Method for securing system protected by a key hierarchy |
DE59710287T DE59710287D1 (de) | 1996-11-28 | 1997-12-18 | Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems |
JP2000526050A JP4351386B2 (ja) | 1996-11-28 | 1997-12-18 | キー階層により保護されたシステムを安全保護する方法 |
PCT/EP1997/007124 WO1999033270A1 (fr) | 1996-11-28 | 1997-12-18 | Procede pour securiser un systeme protege par une hierarchie cryptographique |
ES97953855T ES2201341T3 (es) | 1996-11-28 | 1997-12-18 | Procedimiento para proteger un sistema protegido por una jerarquia de claves criptograficas. |
EP97953855A EP1040662B1 (fr) | 1996-11-28 | 1997-12-18 | Procede pour securiser un systeme protege par une hierarchie cryptographique |
AT97953855T ATE242949T1 (de) | 1996-11-28 | 1997-12-18 | Verfahren zum sichern eines durch eine schlüsselhierarchie geschützten systems |
CA002310406A CA2310406A1 (fr) | 1996-11-28 | 1997-12-18 | Procede pour securiser un systeme protege par une hierarchie cryptographique |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE19649292A DE19649292A1 (de) | 1996-11-28 | 1996-11-28 | Verfahren zum Sichern eines durch eine Schlüsselhierarchie geschützten Systems |
US08/990,446 US6222923B1 (en) | 1996-11-28 | 1997-12-15 | Method for securing system protected by a key hierarchy |
PCT/EP1997/007124 WO1999033270A1 (fr) | 1996-11-28 | 1997-12-18 | Procede pour securiser un systeme protege par une hierarchie cryptographique |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1999033270A1 true WO1999033270A1 (fr) | 1999-07-01 |
Family
ID=27216876
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP1997/007124 WO1999033270A1 (fr) | 1996-11-28 | 1997-12-18 | Procede pour securiser un systeme protege par une hierarchie cryptographique |
Country Status (8)
Country | Link |
---|---|
US (1) | US6222923B1 (fr) |
EP (1) | EP1040662B1 (fr) |
JP (1) | JP4351386B2 (fr) |
AT (1) | ATE242949T1 (fr) |
CA (1) | CA2310406A1 (fr) |
DE (2) | DE19649292A1 (fr) |
ES (1) | ES2201341T3 (fr) |
WO (1) | WO1999033270A1 (fr) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002060118A2 (fr) * | 2001-01-26 | 2002-08-01 | International Business Machines Corporation | Procede permettant de reperer des recepteurs espions dans un systeme de chiffrement de diffusion |
CN1303777C (zh) * | 2001-01-26 | 2007-03-07 | 国际商业机器公司 | 无状态接收机的广播加密和密钥撤销方法 |
US9520993B2 (en) | 2001-01-26 | 2016-12-13 | International Business Machines Corporation | Renewable traitor tracing |
Families Citing this family (66)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7587044B2 (en) * | 1998-01-02 | 2009-09-08 | Cryptography Research, Inc. | Differential power analysis method and apparatus |
WO1999035782A1 (fr) * | 1998-01-02 | 1999-07-15 | Cryptography Research, Inc. | Procede et appareil cryptographiques resistant aux fuites |
WO1999067919A2 (fr) * | 1998-06-03 | 1999-12-29 | Cryptography Research, Inc. | Perfectionnement de normes cryptographiques et autres procedes cryptographiques a reduction des fuites pour cartes a puces et autres systemes cryptographiques |
AU5458199A (en) * | 1998-07-02 | 2000-01-24 | Cryptography Research, Inc. | Leak-resistant cryptographic indexed key update |
DE19847941A1 (de) * | 1998-10-09 | 2000-04-13 | Deutsche Telekom Ag | Verfahren zum Etablieren eines gemeinsamen krytografischen Schlüssels für n Teilnehmer |
US6735313B1 (en) * | 1999-05-07 | 2004-05-11 | Lucent Technologies Inc. | Cryptographic method and apparatus for restricting access to transmitted programming content using hash functions and program identifiers |
US6760441B1 (en) * | 2000-03-31 | 2004-07-06 | Intel Corporation | Generating a key hieararchy for use in an isolated execution environment |
US7013481B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Attestation key memory device and bus |
US6769058B1 (en) | 2000-03-31 | 2004-07-27 | Intel Corporation | Resetting a processor in an isolated execution environment |
US6934817B2 (en) * | 2000-03-31 | 2005-08-23 | Intel Corporation | Controlling access to multiple memory zones in an isolated execution environment |
US7013484B1 (en) | 2000-03-31 | 2006-03-14 | Intel Corporation | Managing a secure environment using a chipset in isolated execution mode |
US7194634B2 (en) * | 2000-03-31 | 2007-03-20 | Intel Corporation | Attestation key memory device and bus |
US7073071B1 (en) | 2000-03-31 | 2006-07-04 | Intel Corporation | Platform and method for generating and utilizing a protected audit log |
US6957332B1 (en) * | 2000-03-31 | 2005-10-18 | Intel Corporation | Managing a secure platform using a hierarchical executive architecture in isolated execution mode |
US6754815B1 (en) | 2000-03-31 | 2004-06-22 | Intel Corporation | Method and system for scrubbing an isolated area of memory after reset of a processor operating in isolated execution mode if a cleanup flag is set |
DE60135681D1 (de) * | 2000-06-21 | 2008-10-16 | Sony Corp | Vorrichtung und Verfahren zur Schlüssel erneuerung in einer hierarchischen Baumschlüsselstruktur |
US6976162B1 (en) * | 2000-06-28 | 2005-12-13 | Intel Corporation | Platform and method for establishing provable identities while maintaining privacy |
US7793111B1 (en) * | 2000-09-28 | 2010-09-07 | Intel Corporation | Mechanism to handle events in a machine with isolated execution |
US7818808B1 (en) | 2000-12-27 | 2010-10-19 | Intel Corporation | Processor mode for limiting the operation of guest software running on a virtual machine supported by a virtual machine monitor |
US6907600B2 (en) | 2000-12-27 | 2005-06-14 | Intel Corporation | Virtual translation lookaside buffer |
US7035963B2 (en) * | 2000-12-27 | 2006-04-25 | Intel Corporation | Method for resolving address space conflicts between a virtual machine monitor and a guest operating system |
US20030068047A1 (en) * | 2001-09-28 | 2003-04-10 | Lee David A. | One-way broadcast key distribution |
US7024555B2 (en) | 2001-11-01 | 2006-04-04 | Intel Corporation | Apparatus and method for unilaterally loading a secure operating system within a multiprocessor environment |
US7340603B2 (en) * | 2002-01-30 | 2008-03-04 | Sony Corporation | Efficient revocation of receivers |
US7631196B2 (en) * | 2002-02-25 | 2009-12-08 | Intel Corporation | Method and apparatus for loading a trustable operating system |
US7069442B2 (en) | 2002-03-29 | 2006-06-27 | Intel Corporation | System and method for execution of a secured environment initialization instruction |
US7139890B2 (en) | 2002-04-30 | 2006-11-21 | Intel Corporation | Methods and arrangements to interface memory |
US6820177B2 (en) * | 2002-06-12 | 2004-11-16 | Intel Corporation | Protected configuration space in a protected environment |
US7142674B2 (en) * | 2002-06-18 | 2006-11-28 | Intel Corporation | Method of confirming a secure key exchange |
GB2394803A (en) * | 2002-10-31 | 2004-05-05 | Hewlett Packard Co | Management of security key distribution using an ancestral hierarchy |
US7165181B2 (en) * | 2002-11-27 | 2007-01-16 | Intel Corporation | System and method for establishing trust without revealing identity |
US20040117532A1 (en) * | 2002-12-11 | 2004-06-17 | Bennett Steven M. | Mechanism for controlling external interrupts in a virtual machine system |
US20040128345A1 (en) * | 2002-12-27 | 2004-07-01 | Robinson Scott H. | Dynamic service registry |
US7900017B2 (en) | 2002-12-27 | 2011-03-01 | Intel Corporation | Mechanism for remapping post virtual machine memory pages |
US7076802B2 (en) * | 2002-12-31 | 2006-07-11 | Intel Corporation | Trusted system clock |
US7062048B2 (en) | 2003-01-27 | 2006-06-13 | Wegener Communications, Inc. | Apparatus and method for single encryption with multiple authorization of distributed content data |
US7206411B2 (en) | 2003-06-25 | 2007-04-17 | Wegener Communications, Inc. | Rapid decryption of data by key synchronization and indexing |
US7415708B2 (en) * | 2003-06-26 | 2008-08-19 | Intel Corporation | Virtual machine management using processor state information |
US20050044292A1 (en) * | 2003-08-19 | 2005-02-24 | Mckeen Francis X. | Method and apparatus to retain system control when a buffer overflow attack occurs |
US7739521B2 (en) * | 2003-09-18 | 2010-06-15 | Intel Corporation | Method of obscuring cryptographic computations |
US7610611B2 (en) * | 2003-09-19 | 2009-10-27 | Moran Douglas R | Prioritized address decoder |
US7177967B2 (en) * | 2003-09-30 | 2007-02-13 | Intel Corporation | Chipset support for managing hardware interrupts in a virtual machine system |
US20050080934A1 (en) | 2003-09-30 | 2005-04-14 | Cota-Robles Erik C. | Invalidating translation lookaside buffer entries in a virtual machine (VM) system |
US8156343B2 (en) | 2003-11-26 | 2012-04-10 | Intel Corporation | Accessing private data about the state of a data processing machine from storage that is publicly accessible |
US8037314B2 (en) * | 2003-12-22 | 2011-10-11 | Intel Corporation | Replacing blinded authentication authority |
US20050152539A1 (en) * | 2004-01-12 | 2005-07-14 | Brickell Ernie F. | Method of protecting cryptographic operations from side channel attacks |
US7802085B2 (en) | 2004-02-18 | 2010-09-21 | Intel Corporation | Apparatus and method for distributing private keys to an entity with minimal secret, unique information |
US20050216920A1 (en) * | 2004-03-24 | 2005-09-29 | Vijay Tewari | Use of a virtual machine to emulate a hardware device |
US7356735B2 (en) * | 2004-03-30 | 2008-04-08 | Intel Corporation | Providing support for single stepping a virtual machine in a virtual machine environment |
US7620949B2 (en) | 2004-03-31 | 2009-11-17 | Intel Corporation | Method and apparatus for facilitating recognition of an open event window during operation of guest software in a virtual machine environment |
JP4162237B2 (ja) * | 2004-06-24 | 2008-10-08 | インターナショナル・ビジネス・マシーンズ・コーポレーション | 複数の復号化装置に対し選択的にメッセージを配信する暗号化通信システム、暗号化装置、復号化装置、暗号化方法、復号化方法、暗号化プログラム、及び復号化プログラム |
US20050288056A1 (en) * | 2004-06-29 | 2005-12-29 | Bajikar Sundeep M | System including a wireless wide area network (WWAN) module with an external identity module reader and approach for certifying the WWAN module |
US7305592B2 (en) * | 2004-06-30 | 2007-12-04 | Intel Corporation | Support for nested fault in a virtual machine environment |
DE102004042094B3 (de) * | 2004-08-30 | 2005-09-22 | RUHR-UNIVERSITäT BOCHUM | Datenübertragungsverfahren und Datenübertragungsanordung |
US7840962B2 (en) * | 2004-09-30 | 2010-11-23 | Intel Corporation | System and method for controlling switching between VMM and VM using enabling value of VMM timer indicator and VMM timer value having a specified time |
US8146078B2 (en) * | 2004-10-29 | 2012-03-27 | Intel Corporation | Timer offsetting mechanism in a virtual machine environment |
US8924728B2 (en) * | 2004-11-30 | 2014-12-30 | Intel Corporation | Apparatus and method for establishing a secure session with a device without exposing privacy-sensitive information |
US7840010B2 (en) * | 2004-12-21 | 2010-11-23 | Shield Security Systems, Llc | Interactive security control system with conflict checking |
US8533777B2 (en) | 2004-12-29 | 2013-09-10 | Intel Corporation | Mechanism to determine trust of out-of-band management agents |
US7395405B2 (en) * | 2005-01-28 | 2008-07-01 | Intel Corporation | Method and apparatus for supporting address translation in a virtual machine environment |
US7809957B2 (en) | 2005-09-29 | 2010-10-05 | Intel Corporation | Trusted platform module for generating sealed data |
KR100916228B1 (ko) | 2006-02-28 | 2009-09-08 | 엘지전자 주식회사 | 페이 퍼 뷰 및 서비스 기반 방송 가입자를 위한 sek와pek의 관리 방법 및 그 통신 시스템 |
US8014530B2 (en) | 2006-03-22 | 2011-09-06 | Intel Corporation | Method and apparatus for authenticated, recoverable key distribution with no database secrets |
JP5276584B2 (ja) * | 2006-06-22 | 2013-08-28 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 階層的な決定論的ペアワイズキーの事前配布方式 |
US20080065751A1 (en) * | 2006-09-08 | 2008-03-13 | International Business Machines Corporation | Method and computer program product for assigning ad-hoc groups |
KR101321401B1 (ko) | 2007-02-02 | 2013-10-25 | 재단법인서울대학교산학협력재단 | 그룹 키 관리 방법 및 이를 이용한 그룹 키 관리 장치 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3124150A1 (de) * | 1980-06-19 | 1982-03-18 | Oak Industries Inc., 16935 Rancho Bernardo, Calif. | Zwei-ebenen-verschluesselungs-system fuer rf-signale |
US4771459A (en) * | 1985-04-29 | 1988-09-13 | U.S. Philips Corp. | System for storing and distributing keys for cryptographically protected communication |
EP0506435A2 (fr) * | 1991-03-29 | 1992-09-30 | Scientific-Atlanta, Inc. | Module de sécurité indépendant et externe pour un décodeur de signaux de télévision qui est extensible numériquement |
DE19511298A1 (de) * | 1995-03-28 | 1996-10-02 | Deutsche Telekom Ag | Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder |
Family Cites Families (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4309569A (en) * | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
US4531020A (en) * | 1982-07-23 | 1985-07-23 | Oak Industries Inc. | Multi-layer encryption system for the broadcast of encrypted information |
US4613901A (en) * | 1983-05-27 | 1986-09-23 | M/A-Com Linkabit, Inc. | Signal encryption and distribution system for controlling scrambling and selective remote descrambling of television signals |
DE3432653C1 (de) * | 1984-09-05 | 1986-01-16 | Westdeutscher Rundfunk, Anstalt des öffentlichen Rechts, 5000 Köln | Verfahren zum Übertragen von Fersehprogrammen an berechtigte Teilnehmer |
FR2613565B1 (fr) * | 1987-04-03 | 1989-06-23 | Bull Cps | Procede pour acheminer des cles secretes vers des modules de securite et des cartes utilisateurs, dans un reseau de traitement d'informations |
DE3827172A1 (de) * | 1987-08-13 | 1989-03-16 | Peter Elsner | Einrichtung zur identifizierung von nachrichten |
US4888801A (en) * | 1988-05-02 | 1989-12-19 | Motorola, Inc. | Hierarchical key management system |
US5220604A (en) * | 1990-09-28 | 1993-06-15 | Digital Equipment Corporation | Method for performing group exclusion in hierarchical group structures |
JPH06141004A (ja) * | 1992-10-27 | 1994-05-20 | Mitsubishi Corp | 課金システム |
DE4326590C1 (de) * | 1993-08-07 | 1994-10-20 | Inst Rundfunktechnik Gmbh | Verfahren zum Sperren oder der Wiedergabe bestimmter Programme in einem Fernsehempfänger oder ihrer Aufzeichnung in einem Videorecorder |
US5432852A (en) * | 1993-09-29 | 1995-07-11 | Leighton; Frank T. | Large provably fast and secure digital signature schemes based on secure hash functions |
-
1996
- 1996-11-28 DE DE19649292A patent/DE19649292A1/de not_active Withdrawn
-
1997
- 1997-12-15 US US08/990,446 patent/US6222923B1/en not_active Expired - Lifetime
- 1997-12-18 WO PCT/EP1997/007124 patent/WO1999033270A1/fr active IP Right Grant
- 1997-12-18 AT AT97953855T patent/ATE242949T1/de active
- 1997-12-18 ES ES97953855T patent/ES2201341T3/es not_active Expired - Lifetime
- 1997-12-18 EP EP97953855A patent/EP1040662B1/fr not_active Expired - Lifetime
- 1997-12-18 DE DE59710287T patent/DE59710287D1/de not_active Expired - Lifetime
- 1997-12-18 JP JP2000526050A patent/JP4351386B2/ja not_active Expired - Fee Related
- 1997-12-18 CA CA002310406A patent/CA2310406A1/fr not_active Abandoned
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE3124150A1 (de) * | 1980-06-19 | 1982-03-18 | Oak Industries Inc., 16935 Rancho Bernardo, Calif. | Zwei-ebenen-verschluesselungs-system fuer rf-signale |
US4771459A (en) * | 1985-04-29 | 1988-09-13 | U.S. Philips Corp. | System for storing and distributing keys for cryptographically protected communication |
EP0506435A2 (fr) * | 1991-03-29 | 1992-09-30 | Scientific-Atlanta, Inc. | Module de sécurité indépendant et externe pour un décodeur de signaux de télévision qui est extensible numériquement |
DE19511298A1 (de) * | 1995-03-28 | 1996-10-02 | Deutsche Telekom Ag | Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder |
Non-Patent Citations (2)
Title |
---|
LEIN HARN ET AL: "A CRYPTOGRAPHIC KEY GENERATION SCHEME FOR MULTILEVEL DATA SECURITY", 1 October 1990, COMPUTERS & SECURITY INTERNATIONAL JOURNAL DEVOTED TO THE STUDY OF TECHNICAL AND FINANCIAL ASPECTS OF COMPUTER SECURITY, VOL. 9, NR. 6, PAGE(S) 539 - 546, XP000162681 * |
SANTOSH CHOKHANI: "TOWARD A NATINAL PUBLIC KEY INFRASTRUCTURE", IEEE COMMUNICATIONS MAGAZINE, vol. 32, no. 9, 1 September 1994 (1994-09-01), pages 70 - 74, XP000476557 * |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002060118A2 (fr) * | 2001-01-26 | 2002-08-01 | International Business Machines Corporation | Procede permettant de reperer des recepteurs espions dans un systeme de chiffrement de diffusion |
WO2002060118A3 (fr) * | 2001-01-26 | 2002-09-19 | Ibm | Procede permettant de reperer des recepteurs espions dans un systeme de chiffrement de diffusion |
US7010125B2 (en) | 2001-01-26 | 2006-03-07 | Interntional Business Machines Corporation | Method for tracing traitor receivers in a broadcast encryption system |
CN1303777C (zh) * | 2001-01-26 | 2007-03-07 | 国际商业机器公司 | 无状态接收机的广播加密和密钥撤销方法 |
CN1310463C (zh) * | 2001-01-26 | 2007-04-11 | 国际商业机器公司 | 在广播加密系统中跟踪叛徒接收机的方法 |
US7698551B2 (en) | 2001-01-26 | 2010-04-13 | International Business Machines Corporation | Method for broadcast encryption and key revocation of stateless receivers |
US9520993B2 (en) | 2001-01-26 | 2016-12-13 | International Business Machines Corporation | Renewable traitor tracing |
US11108569B2 (en) | 2001-01-26 | 2021-08-31 | International Business Machines Corporation | Renewable traitor tracing |
Also Published As
Publication number | Publication date |
---|---|
EP1040662B1 (fr) | 2003-06-11 |
ATE242949T1 (de) | 2003-06-15 |
JP4351386B2 (ja) | 2009-10-28 |
ES2201341T3 (es) | 2004-03-16 |
DE59710287D1 (de) | 2003-07-17 |
JP2001527349A (ja) | 2001-12-25 |
EP1040662A1 (fr) | 2000-10-04 |
DE19649292A1 (de) | 1998-06-04 |
CA2310406A1 (fr) | 1999-07-01 |
US6222923B1 (en) | 2001-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1040662B1 (fr) | Procede pour securiser un systeme protege par une hierarchie cryptographique | |
DE69312828T2 (de) | Zugriffsteuerungsverfahren | |
DE2824135C2 (fr) | ||
DE69528557T2 (de) | Verfahren zur Realisierung geschützten Zugriffs auf gemeinsame Informationen | |
DE19511298B4 (de) | Verfahren zur Erteilung und zum Entzug der Berechtigung zum Empfang von Rundfunksendungen und Decoder | |
DE69834396T2 (de) | Sicheres Datensignalübertragungssystem | |
DE3036596A1 (de) | Verfahren zum gesicherten abwickeln eines geschaeftsvorganges ueber einen ungesicherten nachrichtenkanal | |
DE2401602A1 (de) | Elektronisches kombinationsschloss und schleusensystem | |
DE102017209014A1 (de) | Verfahren und Vorrichtung zum Anfügen von Transaktionen an eine Blockkette | |
EP0768773B1 (fr) | Procédé pour établir une clé commune pour personnes autorisées, utilisant un schéma cryptographique à seuil | |
DE19750779C1 (de) | Verfahren zum Identifizieren von Verrätern proprietärer Daten | |
DE69729685T2 (de) | Verfahren zur Verdeckung eines Geheimcodes in einer Rechnerbeglaubigungsvorrichtung | |
EP0386677B1 (fr) | Méthode de génération d'un nombre aléatoire pour la communication chiffrée de données, en utilisant un nombre de départ variable | |
DE68921316T2 (de) | Verfahren zur Ver- und Entschlüsselung von zusammengesetzten Videosignalen und Gerät zur Durchführung dieses Verfahrens. | |
DE2350288A1 (de) | Drahtfunksystem | |
EP2253097A1 (fr) | Procédé de communication poste à poste sans risque de manipulation, d'écoute ou de piratage dans des réseaux de plusieurs abonnés | |
EP0948193B1 (fr) | Procédé pour l'insertion d'empreintes digitales numériques avec sécurité de manipulation dans des documents électroniques | |
DE2304925A1 (de) | Rechnergesteuerte nebenstellenanlage | |
EP0765550A1 (fr) | Dispositif de dechiffrement d'algorithmes de dechiffrement et procede pour le chiffrement et le dechiffrement au moyen d'un tel dispositif | |
DE3640849C2 (fr) | ||
DE19648824A1 (de) | Verfahren zum gesicherten Nachrichtenaustausch bei Massendiensten, sowie Teilnehmereinrichtung und Diensteanbietereinrichtung hierfür | |
WO2002063824A1 (fr) | Protocole, systeme et dispositifs de telecommunication pour effectuer un vote electronique de maniere anonyme et authentique | |
DE102017211201A1 (de) | Verfahren zum asymmetrischen Schlüsselmanagement und sicherheitsrelevante Anlage | |
DE4416253B4 (de) | Verfahren zur datenschutzgerechten Verteilung von Schlüsselinformationen | |
DE69310670T2 (de) | Verfahren und System zur Verschlüsselung eines Videobildes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CA CN JP KR TR |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1997953855 Country of ref document: EP |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
ENP | Entry into the national phase |
Ref document number: 2310406 Country of ref document: CA Ref country code: CA Ref document number: 2310406 Kind code of ref document: A Format of ref document f/p: F |
|
NENP | Non-entry into the national phase |
Ref country code: KR |
|
WWP | Wipo information: published in national office |
Ref document number: 1997953855 Country of ref document: EP |
|
WWG | Wipo information: grant in national office |
Ref document number: 1997953855 Country of ref document: EP |